Sistem Keamanan IoT dengan Sensor RFID dan Kamera ESP32 untuk Verifikasi Identintas dan Visual

Authors

  • Imam Gunawan STMIK Jayanusa
  • Khairil Hamdi STMIK Jayanusa
  • Joyo Kilat Moko STMIK Jayanusa
  • Budi Sunaryo Universitas Bung Hatta

Keywords:

Security System, IoT, RFID, ESP32 Camera, Prototyping

Abstract

The main problem faced by the madrasah is the lack of visual evidence that can cause a number of problems, including misuse of access cards and the inability to identify perpetrators using fake cards if they want to adopt RFID technology as a security system. This study aims to develop an Internet of Things (IoT)-based security system at Madrasah Ibtidaiyah Wathoniyah Sumber Makmur by utilizing RFID sensors and ESP32 cameras. The system developed is designed to automatically verify identity and provide visual notifications sent via Telegram. The research process began with the collection of qualitative data through direct observation and interviews with the principal, which provided in-depth insights into the existing problems, history, and vision, mission, and organizational structure of the madrasah. Library research was also conducted to collect information from various relevant books and scientific articles, providing the theoretical basis needed for system development. In addition, laboratory research focused on testing and validating prototypes involving hardware components such as ESP32, ESP32 Cam, and PN532 sensors as well as software developed using software such as Arduino IDE, Telegram, and Visual Studio Code. The development method in this study uses a prototyping method that involves active collaboration between designers and end users to ensure that the resulting solution is in accordance with user needs and expectations. The conclusion is that the developed system significantly improves security and access management in madrasahs. This system has proven effective in reducing the risk of access card misuse by providing the necessary visual evidence and accurately detecting illegal access attempts, and can identify perpetrators in illegal access attempts with fake access cards that can be spam.

References

K. Hamdi, “ANALISA KEPUASAN SISWA TERHADAP SARANA PRASARANA SEKOLAH MENGGUNAKAN FUZZY LOGIC,” J. Ipteks Terap., vol. 11, no. 3, p. 208, Oct. 2017.

M. Gawlik-Kobyli?ska and P. Maciejewski, “New Technologies in Education for Security and Safety,” in Proceedings of the 2019 8th International Conference on Educational and Information Technology, 2019, pp. 198–202.

I. Gunawan, S. Kom, and M. Kom, “SISTEM INFORMASI ABSENSI SISWA BAGI ORANG TUABERBASIS WEB DAN SMS SEBAGAI UPAYA MENINGKATKAN KONTROL ORANG TUA TERHADAP ANAK (STUDI KASUS: SMK NASIONAL PADANG),” J-Click, vol. 3, no. 2, 2017.

N. Novinaldi, I. Gunawan, D. A. Rahayu, D. E. Subroto, and I. Ikhsan, “Workshop Routing dan Server bagi Guru-guru Anggota IGMP TIK/Informatika,” J. Pustaka Mitra (Pusat Akses Kaji. Mengabdi Terhadap Masyarakat), vol. 3, no. 2, pp. 106–109, Mar. 2023.

Arnita, B. Sunaryo, P. R. Daulay, F. Hasnul, and Hidayat, “Gate-apps Number Plate Recognition untuk Sistem Akses Parkir Berbasis Internet of Things,” Pros. SISFOTEK, vol. 5, no. 1, pp. 270–276, 2021.

H. Setiawan, T. Tasmi, and D. Dhamayanti, “Design of Additional Safety Locks for Motor Vehicles Using RFID,” J. Inf. Syst. Informatics, vol. 5, no. 4, pp. 1691–1704, Dec. 2023.

Arpan, Mohammad Yusup, and Aidil Ahmad, “Peningkatan Efisiensi dan Akurasi Kehadiran Sekolah: Sistem Berbasis IoT dengan Teknologi RFID di SMK Putra Anda Binjai,” J. MAHAJANA Inf., vol. 9, no. 1, pp. 7–18, Jun. 2024.

V. V. Jituri, “RADIO FREQUENCY IDENTIFICATION (RFID) AND EASE OF LIFE,” Int. J. Res. -GRANTHAALAYAH, vol. 8, no. 8, pp. 49–55, Aug. 2020.

J. S. Brisbane, “Enhancing School Security System Using RFID: A Comprehensive Approach,” Int. Sci. J. Eng. Manag., vol. 03, no. 03, pp. 1–9, Mar. 2024.

B. Kaliski, “RFID Privacy: Challenges and Progress,” in ISSE 2004 — Securing Electronic Business Processes, Wiesbaden: Vieweg+Teubner Verlag, 2004, pp. 108–116.

W. Huang et al., “An efficient visualization method of RFID indoor positioning data,” in The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014), 2014, no. Icsai, pp. 497–504.

A. Li, J. Li, Y. Zhang, D. Han, T. Li, and Y. Zhang, “Secure UHF RFID Authentication With Smart Devices,” IEEE Trans. Wirel. Commun., vol. 22, no. 7, pp. 4520–4533, Jul. 2023.

Y. Wang, J. Shen, X. Guo, and W. Dong, “Research on RFID attack methods,” in 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), 2020, pp. 433–437.

D. R. Tisna, T. Maharani, and K. T. Nugroho, “PEMANFAATAN CHATBOT TELEGRAM UNTUK MONITORING DAN KONTROL KUALITAS AIR MENGGUNAKAN ESP32,” JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 9, no. 3, pp. 1292–1306, Aug. 2024.

R. T. Prabu, J. T, and G. Ramkumar, “A Real-Time Internet of Things based Systematic Toll Plaza Controlling System using Logical RFID,” in 2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), 2023, pp. 1–8.

P. Samuda, K. Sivachandar, N. G. Praveena, C. Nithiya, D. Kamalesh, and C. Lokesh, “Low-cost Prototype for IoT-based Smart Monitoring through Telegram,” in 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), 2023, pp. 1–5.

G. S, A. R, P. B, K. A, V. V A, and L. K, “Design and Development of IoT Camera with CHATBOT for Domestic Surveillance,” in 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS), 2023, pp. 1–5.

Z. Muslimin, M. A. Wicaksono, M. F. Fadlurachman, and I. Ramli, “Rancang Bangun Sistem Keamanan dan Pemantau Tamu pada Pintu Rumah Pintar Berbasis Raspberry Pi dan Chat Bot Telegram,” J. Penelit. Enj., vol. 23, no. 2, pp. 121–128, Nov. 2019.

R. Ganpatrao Sabale, “Comparative Study of Prototype Model For Software Engineering With System Development Life Cycle,” IOSR J. Eng., vol. 02, no. 07, pp. 21–24, Jul. 2012.

F. Oura, T. Ainoya, A. Eibo, and K. Kasamatsu, “Prototyping Process Analyzed from Dialogue and Behavior in Collaborative Design,” H. Mori and Y. Asahi, Eds. Cham: Springer Nature Switzerland, 2023, pp. 545–556.

Downloads

Published

2024-11-30

How to Cite

Gunawan, I., Hamdi, K., Moko, J. K., & Sunaryo, B. (2024). Sistem Keamanan IoT dengan Sensor RFID dan Kamera ESP32 untuk Verifikasi Identintas dan Visual. Prosiding SISFOTEK, 8(1), 665 - 672. Retrieved from http://www.seminar.iaii.or.id/index.php/SISFOTEK/article/view/579

Issue

Section

Sistem Informasi dan Teknologi